2023
DOI: 10.1145/3567595
|View full text |Cite
|
Sign up to set email alerts
|

Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice

Abstract: The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or the MyEtherWallet attack make it painfully clear: the security of end users hinges on the security of the surrounding infrastructure: routing, DNS, content delivery, and the PKI. There are many competing, but isolated proposals to increase security, from the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…We run experiments on Speicher et al's (2018a) Stackelberg variants of IPC and pentesting benchmarks, on variants of these benchmarks scaled to have many objects, and on web infrastructure defense-attack models as per Tizio et al (2022). Our experiments show that, while lifted Stackelberg planning is inferior on small tasks, it is typically vastly superior on large tasks.…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…We run experiments on Speicher et al's (2018a) Stackelberg variants of IPC and pentesting benchmarks, on variants of these benchmarks scaled to have many objects, and on web infrastructure defense-attack models as per Tizio et al (2022). Our experiments show that, while lifted Stackelberg planning is inferior on small tasks, it is typically vastly superior on large tasks.…”
Section: Introductionmentioning
confidence: 94%
“…Stackelberg planning is a natural tool for analyzing countermeasures in security applications, e.g., network penetration testing (Boddy et al 2005;Hoffmann 2015) or emailinfrastructure threat analysis (Speicher et al 2018b), the leader modeling defense mechanisms against attack vectors represented by the follower. Recently, Tizio et al (2022) used Stackelberg planning for analyzing the open web infrastructure, but found that off-the-shelf planners suffer from poor scalability. With instances that easily contain many thousands of objects, Tizio et al quickly identified the grounding preprocess as a major bottleneck.…”
Section: Introductionmentioning
confidence: 99%
“…The objective of the first player (called the leader) is to choose and to play a plan that maximally raises the cost of the second player (the follower) to subsequently achieve its goal. This type of planning is useful for real-world adversarial settings commonly found in the cyber-security domain (Speicher et al 2018b;Di Tizio et al 2023). To solve Stackelberg planning tasks, there so far exists just a single generic algorithm paradigm called leader-follower search (Speicher et al 2018a), which searches over possible leader plans, solving a classical planning task for each.…”
Section: Introductionmentioning
confidence: 99%